Loading [MathJax]/extensions/MathMenu.js
Kaoru Ota - IEEE Xplore Author Profile

Showing 1-25 of 266 results

Filter Results

Show

Results

Blockchain-enabled Internet of Medical Things (BIoMT) has received extensive attention and in-depth research to solve the centralized, data island problems with the rapid developments of blockchain-related technologies. However, many different chains with different data structures, consensus protocols, and cryptographic algorithms are constructed, which brings a new "data island" problem. Meanwhil...Show More
The medium access control (MAC) protocol plays a crucial role in wireless communications, influencing key performance metrics, such as energy consumption, delay, collision, and throughput. This paper introduces the Contend Node Restricted Joint Consecutive Packet Transmissions Receiver-Initiated (CNR-CPT-RI) protocol, specifically designed to minimize collisions and reduce energy consumption in wa...Show More
In disaster management, utilizing UAVs for emergency communication has become increasingly feasible due to their mobility and independence from terrain, enabling the rapid deployment of flexible and scalable wireless network architectures. A primary challenge, however, lies in efficiently utilizing the limited energy of UAVs, necessitating optimized scheduling to maximize network access during the...Show More
Graph neural networks (GNNs) are widely utilized in recommender systems because they can produce effective embeddings by incorporating high-order collaborative information from neighbors. However, traditional GNN-based recommendation approaches face limitations in the new item cold-start scenario. This is because new items typically have limited or no neighbors, resulting in incomplete or complete...Show More
Interest flooding attacks (IFAs) has been regarded as some of the most harmful security risks in named data networks (NDNs), and they have always been highly important in the next-generation network security field. In recent years, a variant and upgraded version of the original IFA named a collusive IFA (CIFA) has been witnessed. Since a CIFA is launched intermittently and is assisted by malicious...Show More
Vehicle GPS devices provide abundant trajectory data that can be exploited to generate helpful pick-up service recommendations for taxi drivers. However, existing trajectory clustering approaches struggle to perform well on trajectory data with different distribution characteristics (e.g., dense in downtown and discrete in suburbs) simultaneously. Additionally, current prediction models mainly foc...Show More
Filterless digital class-D amplifiers (CDAs) are very attractive for audio-visual devices thanks to their high efficiency, small size and low cost. However, their high-frequency switching-mode operation will cause electromagnetic interference (EMI) problems. Spread spectrum techniques are often used to solve the EMI problems but will cause baseband distortions in amplifiers. In this article, an al...Show More
To support the escalating traffic demands in the 6 G era, the novel computing paradigm of in-network computing (INC), where tasks can be processed on the forwarding path, is emerging with enhanced network performance and improved service quality. Considering the large network scale with high dynamics, effective task scheduling in INC paradigm becomes imperative but challenging. In this work, we in...Show More

AI-Centric D2D in 6G Networks

Jianwen Xu;Kaoru Ota;Mianxiong Dong

IEEE Networking Letters
Year: 2024 | Volume: 6, Issue: 4 | Journal Article |
As a fundamental component of 6G, Device-to-Device (D2D) communication facilitates direct connections between devices without base stations. In order to support advanced AI applications in ubiquitous scenarios, in this letter, we propose an AI-centric D2D communication infrastructure upon mobile devices, addressing current challenges in bandwidth and transmission speed. This approach aims to lever...Show More

AI-Centric D2D in 6G Networks

Jianwen Xu;Kaoru Ota;Mianxiong Dong

Year: 2024 | Volume: 6, Issue: 4 | Journal Article |
In this paper, we address the significant challenge of data scarcity in the field of crack segmentation, a key aspect of structural health monitoring. To tackle this, we introduce the CrackGrowDiff framework, an innovative approach for expanding crack datasets. Utilizing a two-stage controllable generation process that combines a random walk algorithm and semantic diffusion models, our framework m...Show More
We apply federated learning (FL) to a distributed intrusion detection system (IDS), in which we deploy numerous detection servers on the edge of a network. FL can mitigate the impact of decreased training data in each server and exhibit almost the same detection rate as that of the non-distributed IDS for all attack classes. We verify the effect of FL using explainable artificial intelligence (XAI...Show More
This letter proposes a new atmospheric phase screen (APS) compensation method for ground-based synthetic aperture radar interferometry (InSAR). Conventionally, the APS trend is retrieved employing the assumption that the displacement component is a high spatial frequency component, thus making it separable from the APS trend and easy to be identified as outliers during the trend estimation whether...Show More
Network Function Virtualization (NFV) is a promising technology to make 5G networks more flexible and cost-efficient. With NFV, a 5G network service is implemented as several Virtual Network Functions (VNFs) that run on general machines, called a Service Function Chain (SFC). A recent survey has revealed that when multiple VNFs are colocated in the same machine, contention for shared physical reso...Show More
Social virtual reality (VR) applications provide a diverse and evolving ecosystem for different groups to socialize in VR. Understanding how people explore social VR applications is crucial for VR developers, such as designing social VR content. Previous work has focused on interviewing participants to study the user experience (UX) of social VR. However, the potential value of user reviews of soc...Show More
The Internet of Robotic Things (IoRT) thrives in extreme environments where human operation is often unfeasible, positioning it a pivotal innovation for future enhancements in quality of life. Nonetheless, IoRT faces substantial challenges, particularly in timely environmental sensing and decision making. This article introduces a novel reconfigurable intelligent surface (RIS)-enabled integrated s...Show More
The rise of the Internet of Things (IoT) and the Internet of Vehicles (IoV) has accelerated the realization of smart cities, where cameras as interconnected consumer electronics (CE) are deployed across cities to capture target images. The widespread deployment of monitoring equipment has prompted us to focus on the target re-identification (Re-ID) issue. One major challenge about this issue is th...Show More
The integration of vehicle edge computing (VEC) and air-ground integrated network is considered as a key technology to achieve autonomous driving. It exploits the ubiquitous service coverage and enables tasks to be offloaded to various components, such as high-altitude platform (HAP), unmanned aerial vehicle (UAV), and roadside unit (RSU). In this article, we address the challenge of minimizing th...Show More
Large Language Models (LLMs) have demonstrated remarkable proficiency in generating text and producing fluent, succinct, and precise linguistic expressions. Limited battery life and computing power make it challenging to process LLM inference tasks in mobile devices. Intelligent edge computing brings the opportunity to help users process LLM inference tasks in real-time by offloading computations ...Show More
In this paper, we investigate the deployment and service of pre-trained foundation models (PFMs) in mobile edge networks with cell coupling. We formulate a joint resource allocation and request routing optimization problem (RARP) to achieve a trade-off between the accuracy loss and cost of artificial intelligence-generated content (AIGC). For problem solving, we propose an alternating optimization...Show More
Recently, unmanned aerial vehicle (UAV)-enabled mobile edge computing (MEC) has emerged as a practical paradigm to enable low latency computing offloading for dispersed users in the fifth generation (5G) wireless networks. However, severe security and privacy concerns are associated with the open environment between the UAVs and edge computing nodes. In this paper, we address these challenges by i...Show More
With the proliferation of resource-hungry applications, a common paradigm to quickly respond to the ever-increasing demands of tasks is mobile edge computing (MEC), which deploys resources on the premise of grasping task information (including time and quantity of task release, etc). Actually, task generation is dynamic in many practical scenarios, and it is unrealistic for MEC servers to acquire ...Show More
As one innovative paradigm, reconfigurable intelligent surface (RIS) has been applied to enhance coverage in wireless communication networks by providing a virtual connection between the transmitter and the receiver in scenarios where line-of-sight (LoS) is obstructed. In this work, the issue of optimizing multi-RIS deployment locations is considered to enhance coverage while reducing network cost...Show More
Overtaking and lane-changing are essential maneuvers in autonomous driving. A correct and timely operation can reduce the probability of collisions, enable vehicles to avoid potential hazards on the road, and enhance overall safety. In addition, they also play a vital role in ensuring the efficient flow of traffic and timely arrival at destinations. Currently, the dominant research on this problem...Show More
Compared with terrestrial network, the air–ground integrated network consisting of unmanned aerial vehicles (UAVs) and high-altitude platforms (HAPs) offers the advantages of large coverage, high capacity, and seamless connection. Therefore, the air–ground integrated network can provide effective communication services for the Internet of Remote Things (IoRT). In order to reduce the end-to-end (e2...Show More
As the demand for frozen and fresh products grows, the security and traceability of cold-chain logistics data have received a lot of attention in recent years. Cold-chain logistics (CCL) systems play an important role in data collecting and sharing, but the traditional centralized CCL systems are vulnerable to threats of data loss, tempering, and privacy disclosure. Aiming at these problems, this ...Show More